Which two parameters must be identical to the remote device’s parameters when designing the local IKE proposal?
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 seconds?